Abstract is missing.
- Paint It Black: Evaluating the Effectiveness of Malware BlacklistsMarc Kührer, Christian Rossow, Thorsten Holz. 1-21 [doi]
- GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted EnvironmentZhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin. 22-45 [doi]
- PillarBox: Combating Next-Generation Malware with Fast Forward-Secure LoggingKevin D. Bowers, Catherine Hart, Ari Juels, Nikos Triandopoulos. 46-67 [doi]
- Dynamic Reconstruction of Relocation Information for Stripped BinariesVasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis. 68-87 [doi]
- Evaluating the Effectiveness of Current Anti-ROP DefensesFelix Schuster, Thomas Tendyck, Jannik Pewny, Andreas Maaß, Martin Steegmanns, Moritz Contag, Thorsten Holz. 88-108 [doi]
- Unsupervised Anomaly-Based Malware Detection Using Hardware FeaturesAdrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo. 109-129 [doi]
- Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and DetectionJacopo Corbetta, Luca Invernizzi, Christopher Krügel, Giovanni Vigna. 130-149 [doi]
- You Can't Be Me: Enabling Trusted Paths and User Sub-origins in Web BrowsersEnrico Budianto, Yaoqi Jia, Xinshu Dong, Prateek Saxena, Zhenkai Liang. 150-171 [doi]
- Measuring Drive-by Download Defense in DepthNathaniel Boggs, Senyao Du, Salvatore J. Stolfo. 172-191 [doi]
- A Lightweight Formal Approach for Analyzing Security of Web ProtocolsApurva Kumar. 192-211 [doi]
- Why Is CSP Failing? Trends and Challenges in CSP AdoptionMichael Weissbacher, Tobias Lauinger, William K. Robertson. 212-233 [doi]
- Synthetic Data Generation and Defense in Depth Measurement of Web ApplicationsNathaniel Boggs, Hang Zhao, Senyao Du, Salvatore J. Stolfo. 234-254 [doi]
- A Comparative Evaluation of Implicit Authentication SchemesHassan Khan, Aaron Atwater, Urs Hengartner. 255-275 [doi]
- Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure ChannelYinzhi Cao, Yan Shoshitaishvili, Kevin Borgolte, Christopher Krügel, Giovanni Vigna, Yan Chen. 276-298 [doi]
- Wait a Minute! A fast, Cross-VM Attack on AESGorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar. 299-319 [doi]
- Count Me In: Viable Distributed Summary Statistics for Securing High-Speed NetworksJohanna Amann, Seth Hall, Robin Sommer. 320-340 [doi]
- Formal Analysis of Security Procedures in LTE - A Feasibility StudyNoomene Ben Henda, Karl Norrman. 341-361 [doi]
- Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense NetworksIl-Gu Lee, Hyunwoo Choi, Yongdae Kim, Seungwon Shin, Myungchul Kim. 362-383 [doi]
- On Emulation-Based Network Intrusion Detection SystemsAli Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, Sandro Etalle. 384-404 [doi]
- Quantitative Evaluation of Dynamic Platform Techniques as a Defensive MechanismHamed Okhravi, James Riordan, Kevin M. Carter. 405-425 [doi]
- Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the WildKartik Nayak, Daniel Marino, Petros Efstathopoulos, Tudor Dumitras. 426-446 [doi]
- Towards a Masquerade Detection System Based on User's TasksJ. Benito Camiña, Jorge Rodríguez, Raul Monroy. 447-465 [doi]